SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
GPRS and 3G Wireless Applications: Professional Developer's Guide
GPRS and 3G Wireless Applications: Professional Developer's Guide
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Hi-index | 4.10 |
The Transport Layer Security Key-Exchange Method (TLS-KEM) extension uses an out-of-band shared secret to integrate TLS with wired and wireless networks without influencing security robustness.